Computer Hacking Computer hacking has been present in the United States since 1960. According to the definition, to hack a computer is to devise or modify a computer program skillfully. Generally, computer hacking is viewed in a negative light. This is due to the fact that most times computer hackers work to put "bugs" into computer programs that cause it to malfunction. Believe it or not, computer hackers will have meetings in order to compare strategies and techniques to develop their hacking skills. Hackers will also create programs called viruses. These viruses are intended to spread via pop- ups or emails and can potentially ruin a person's computer drive. There is no purpose behind sending a virus. The only purpose is for the hacker to demonstrate their skills to ruin a computer.
Often times, there is not profit involved with the computer hacking; a hacker is simply motivated by the challenge of breaking the system. The terms computer hacker and computer cracker are used interchangeably. Both terms are accepted in the computer programming world. In truth, hackers are extremely intelligent and talented people. It takes extreme skill to create a program that will dominate another program. The thing is, they are using their talents for evil instead of good.Computer hackers who use their programs to destroy computers are computer criminals, or "black hats". The computer programmers who work for government associations or computer software companies are called "white hats".
Phishing Computer phishing is a term that refers to the search for personal information that is later used for crimes such as identity theft. Emails, for example can be used for phishing purposes. "Phishers" will send an email that looks like a legitimate business document that people will trust and enter their personal information into. Believe it or not, people will enter information such as credit card numbers, bank account passwords, and even social security numbers. Technically phishing is a type of spam; and no spam should be trusted. So, if an email is ever received asking for personal information be sure to search for security symbols such as a lock next to the credit card number slot. Also, as an extra safety precaution email the company the email is supposedly coming from and ask if this type of email is standard. Always use caution when entering personal information.
Computer hacking has been present in the United States since 1960. According to the definition, to hack a computer is to devise or modify a computer program skillfully. Generally, computer hacking is viewed in a negative light. This is due to the fact that most times computer hackers work to put "bugs" into computer programs that cause it to malfunction. Believe it or not, computer hackers will have meetings in order to compare strategies and techniques to develop their hacking skills. Hackers will also create programs called viruses. These viruses are intended to spread via pop- ups or emails and can potentially ruin a person's computer drive. There is no purpose behind sending a virus. The only purpose is for the hacker to demonstrate their skills to ruin a computer.
Often times, there is not profit involved with the computer hacking; a hacker is simply motivated by the challenge of breaking the system. The terms computer hacker and computer cracker are used interchangeably. Both terms are accepted in the computer programming world. In truth, hackers are extremely intelligent and talented people. It takes extreme skill to create a program that will dominate another program. The thing is, they are using their talents for evil instead of good.Computer hackers who use their programs to destroy computers are computer criminals, or "black hats". The computer programmers who work for government associations or computer software companies are called "white hats".
Phishing
Computer phishing is a term that refers to the search for personal information that is later used for crimes such as identity theft. Emails, for example can be used for phishing purposes. "Phishers" will send an email that looks like a legitimate business document that people will trust and enter their personal information into. Believe it or not, people will enter information such as credit card numbers, bank account passwords, and even social security numbers. Technically phishing is a type of spam; and no spam should be trusted. So, if an email is ever received asking for personal information be sure to search for security symbols such as a lock next to the credit card number slot. Also, as an extra safety precaution email the company the email is supposedly coming from and ask if this type of email is standard. Always use caution when entering personal information.
For more information, check out this website: http://computer.howstuffworks.com/phishing.htm
Kay, Russell. "Phishing - Computerworld." Computerworld - IT news, features, blogs, tech reviews, career advice. N.p., n.d. Web. 12 Jan. 2011. <http://www.computerworld.com/s/article/89096/Phishing>.
"Computer Hacking." College of Education at the University of Illinois at Urbana-Champaign. N.p., n.d. Web. 12 Jan. 2011. <http://www.ed.uiuc.edu/wp/crime/hacking.htm>.